TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo.
date: 2003-01-27 21:35:10
subject: Re: where does a hack process begin

From: "Geo." 

"Rich"  wrote in message news:3e34b3fc{at}w3.nls.net...

>>   I'm not sure your concern is as clear cut as it might be with a
corporate server.  You mentioned in another thread today that you had a
problem with a collocated server for which your customer has responsibility
or shares responsibility for the server and you can suffer from your
customers mistakes.  This is not a technical issue and there is no
technical solution.<<

It is a technical issue and there is a technical solution, it's called
packet shaping and it should have stopped the traffic from the customers
machine from reaching the router at a rate greater then their allowed
bandwidth. I'm still trying to figure out what it is about this worm that
allowed it to get past the packet shaper. It's obviously a misconfiguration
of some sort since the packets weren't spoofed but as yet the technical
solution evades me..

But for a moment lets assume you are correct, that as long as a user is
involved there is no technical solution. What are the implications of this
line of reasoning wrt copy protection then?

Geo.

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.